National Repository of Grey Literature 226 records found  beginprevious41 - 50nextend  jump to record: Search took 0.00 seconds. 
Identifying Skype Traffic Using NetFlow Data
Šebeň, Patrik ; Veselý, Vladimír (referee) ; Grégr, Matěj (advisor)
NetFlow is a network protocol commonly used for collectiong IP traffic information. But there is a way to use this collected data for indentifying clients in Skype communication. This paper describes identifiable patterns in Skype protocol and how to find them in NetFlow data. This way we can identify nodes and supernodes in Skype network.
Cisco Command Line Support in Highlight.js
Mateáš, Branislav ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
The aim of the work was to create a tool to support users of Cisco devices. Support is based on color-coded command syntax. The result of the work is a tool for off-line browsing of web pages containing Cisco commands and configuration statements with color resolution of keywords, IP addresses, numbers, strings, domains, network paths, etc. When creating the utility for Cisco users, current information technologies were used as regular expressions, which are used in the JavaScript programming language used, and the color highlighting itself is solved as an extension of the Highlight.js tool. The proposed grammar was published on the official website of the Highlight.js internet community, where it can be accessed by all interested future users. Part of the work is also testing the proposed tool on computers of different configurations in the three most used Internet browsers.
SS7 Honeypots - Proactive Mobile Networks Fraud Protection
Kubiš, Juraj ; Veselý, Vladimír (referee) ; Pluskal, Jan (advisor)
This diploma thesis deals with the issue of attacks and fraud against mobile networks, with the main aim being implementation of a honeypot-type tool possessing the ability to respond to these accordingly. Thus, this thesis contains a basic introduction into mobile networks, their topology and commonly used protocols, along with analysis of their general security. This is followed by a clarification of the term honeypot itself, with an explanation of motivations for its deployment into the networks, together with listing of advantages and disadvantages such deployment may bring. The rest of the thesis deals with the actual implementation of such tool, specifically with its design, realisation and testing. This thesis presents a method for responding to the supported frauds, a detailed description of the implementation, configuration and outputs of the tool. The process of testing whether the implementation corresponds to the presented design is described here. The implemented tool is evaluated and its further possible improvements are discussed.
Processing of the Blockchain Employing IPFS
Múčka, Matúš ; Lichtner, Ondrej (referee) ; Veselý, Vladimír (advisor)
Cieľom tejto práce je navrhnúť platformu na spracovanie a preskúmavanie blockchainu vybraných kryptomien pri použití IPFS. Na riešenie tohoto problému bolo potrobné navrhnúť vlastný decentralizovaný a distribuovaný databázový systém, ktorý podporuje pokročilé dotazy. Vytvorené riešenie poskytuje prehľadné grafické užívateľské rozhranie, ktoré slúži na vizualizáciu dát a taktiež API, vďaka ktorému sa dá systém jednoducho napojiť na iné aplikácie. Prínosom tejto práce je nový pohľad na zpracovávanie blockchainu čo otvára nové možnosti v~jeho prehľadávaní.
Network Configuration Synthesis and Verification
Černeková, Alžbeta ; Veselý, Vladimír (referee) ; Ryšavý, Ondřej (advisor)
The subject of this master's thesis is to address the topic of network devices configuring. It resolves the problems related to simplifying certain parts of configuration while eliminating frequent errors or issues. It introduces a solution to setting of IP addresses on router's interfaces. Furthermore it presents the generation of configuration for particular dynamic routing scenarios and its application and methods for its verification on network devices. It also demonstrates the preparation of configuration of VPN tunnel between two devices. The conclusion of this thesis contains possibilities for further extensions or improvements.
Correlation of Inbound and Outbound Traffic of Tor Network
Coufal, Zdeněk ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
Communication in public networks based on the IP protocol is not really anonymous because it is possible to determine the source and destination IP address of each packet. Users who want to be anonymous are forced to use anonymization networks, such as Tor. In case such a user is target of lawful interception, it presents a problem for those systems because they only see that the user communicated with anonymization network and have a suspicion that the data stream at the output of anonymization network belong to the same user. The aim of this master thesis was to design a correlation method to determine the dependence of the data stream at the input and the output of the Tor network. The proposed method analysis network traffic and compares characteristics of data streams extracted from metadata, such as time of occurence and the size of packets. This method specializes in correlating data flows of protocol HTTP, specifically web server responses. It was tested on real data from the Tor network and successfully recognized dependency of data flows.
Bitcoin Mining Acceleration
Novotný, Jan ; Veselý, Vladimír (referee) ; Kajan, Michal (advisor)
This master's thesis deals with virtual currency called Bitcoin. It describes the functioning of the currency of technical perspective especially the implementation of the transaction, the way of its validation and ensuring the integrity by using cryptographic functions. Furthermore, it describes the principle of the Bitcoin creation, particularly mining method called pooled mining. The thesis also describes the communication protocols and design of architecture to acceleration of the bitcoin mining. Finally, there are described tests, assessment and proposals for the continuation of work.
Modelling QoS in Computer Networks
Danko, Martin ; Veselý, Vladimír (referee) ; Ryšavý, Ondřej (advisor)
Quality of service (QoS) is an important consideration in networking, but it is also a significant challenge. Providing QoS guarantees becomes even more challenging when you add the complexities to the network like voice and video applications. This master's thesis focuses on QoS modeling and simulation in discrete event simulation system OMNeT++. The implementation of multiple techniques for QoS simulation is added to OMNeT++ within this work. All implemented modules are validated against the QoS tools on real routers. The last part of the work presents the possibility of QoS simulation in newly implemented modules.
Web Traffic Data Export to MAFF
Janeček, Vít ; Pluskal, Jan (referee) ; Veselý, Vladimír (advisor)
The goal of this bachelor thesis was to get acquainted with the principles of transmission, storage and re-visualisation of web traffic. The next part lied with the design and realization of the module for the reconstruction and exporting of the web traffic contents. This module allows to assemble the websites acquired from the captured web communication. It also allows to visualize such websites. The outputs of the module are made through the archival format MAAF, which serves to store web pages for the option of later display. The basic validation of the module functionality was done using test sets.
IPv6 Modelling in OMNeT++
Černý, Marek ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
OMNeT++ is a discrete-event simulator commonly used to build various network simulations. It can be extended by INET framework that supplies models of protocols and devices from TCP/IP environment. This paper explores current capabilities of INET to model IPv6, particularly routing. Implemented extension includes modules of dual-stack router and dual-stack host that support XML-based configuration of IPv6 addressing and static routing. We also introduce an OSPFv3 module that implements most of auxiliary features and is ready for future development of the routing protocol core.

National Repository of Grey Literature : 226 records found   beginprevious41 - 50nextend  jump to record:
See also: similar author names
22 VESELÝ, Vojtěch
3 Veselý, V.
1 Veselý, Viktor
2 Veselý, Vladan
2 Veselý, Vladislav
1 Veselý, Vlastimil
22 Veselý, Vojtěch
2 Veselý, Vratislav
27 Veselý, Václav
5 Veselý, Vít
2 Veselý, Vítek
2 Veselý, Vítězslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.